From patchwork Tue Jul 2 05:52:29 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: CLEMENT MATHIEU--DRIF X-Patchwork-Id: 1955049 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=eviden.com header.i=@eviden.com header.a=rsa-sha256 header.s=mail header.b=epY4995c; dkim=pass (2048-bit key; unprotected) header.d=Eviden.com header.i=@Eviden.com header.a=rsa-sha256 header.s=selector1 header.b=PsklfqbP; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=patchwork.ozlabs.org) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4WCsYk2lxtz1xqd for ; Tue, 2 Jul 2024 15:54:34 +1000 (AEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sOWRX-0007uj-FD; Tue, 02 Jul 2024 01:52:43 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sOWRU-0007ts-NI for qemu-devel@nongnu.org; Tue, 02 Jul 2024 01:52:40 -0400 Received: from smarthost1.eviden.com ([80.78.11.82]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sOWRR-0006TL-TM for qemu-devel@nongnu.org; Tue, 02 Jul 2024 01:52:40 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=eviden.com; i=@eviden.com; q=dns/txt; s=mail; t=1719899559; x=1751435559; h=from:to:cc:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=WA4JmnFO6quJgJjuMmHqYZlma04wF7aXCgGdNhPC1xo=; b=epY4995ciGUCqvHEYKpKMoMsK5w5kwyUXSidJPXavUHZnt4HsYOJBD24 OEI1zUAiq6wG1W/3Bu9ea2aDJiL7H57nVY+m3E6b/EsD0OkPBkNc2ziE6 jeVhXBkgJ+VMd+5izWhLqy3FHTa2Ji9aoiRbinbKUvn7ALaEru2DKz/ZC UISjqcA8mna15EJQt/bZ5mTybbE5caAduPV3o4bZCV3DhIs5pm9i+VWOM m4Agciti67QjdYIUq1db1UDaDTYiS5qBVlhYrlK59G3txfxHfnEFGPSZr bQlQDIEhALCub2UxlOaCtw1mZUKH1Ny/Qo7g7g9SeYmAJMb1klaayz+Xg Q==; X-IronPort-AV: E=Sophos;i="6.09,178,1716242400"; d="scan'208";a="15715665" X-MGA-submission: MDH7J+G00Vc8OnHMOHsR0T63+Nmlr0nA7a2GgFLUCbWcL09pKTTjd8e4Iyq8clSTPoXSx8bQMk7aEkosgTBIByhsRkbVjxKDj+5punL2xQ7UZONt1PKFET/0emEfCs5eL/lE5DM3GzR3StPTzJaOMLReDJnF4JVr818QsnF8ePBMUQ== Received: from mail-am6eur05lp2105.outbound.protection.outlook.com (HELO EUR05-AM6-obe.outbound.protection.outlook.com) ([104.47.18.105]) by smarthost1.eviden.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Jul 2024 07:52:32 +0200 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AZrL5kBs38kYzameSwerqVEWO+OdPNE82F5aTFBFrfCU696WxL+B0iW5+g7Dk1W4Txmy2iHtWBvl4KwcNFVYckIpMnGWy4kGA2+9AW8F5X1D2qEB9zd44cyPqwUIHGgf4GY4tnI/gHoBZu83QusD9qYV9CZRpfA+2mCsjMldX3z23fv1bf35sHlc11fN/7oeeDYApw4sm0IdXHhbzzxtgQ9A9r5zGGYNNMKtmXlL4eQaxZEoELEvKbAeyy2qH/HFAEYfijs56djuAxqSz+rMqwI2YpG9QYbh8B5EXAlzfvVpH/7DCVVV2m5fVwGHyC3JwuM7oMS8Lmw2MEwSg/YB5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=WA4JmnFO6quJgJjuMmHqYZlma04wF7aXCgGdNhPC1xo=; b=Pw8jsaO49wo3ek0gnt6aSt4nVOObSDhhLW8gQoHXi/zSNInL3gO7WbdmJeryfZT4NMSzBsWjIXrNx03UEehnFdUcoyPtm1ifoktMd44L7KN4Pvjtf96smXWt9808QzCkKwRJoSKvv9AXquLJz3RROGo2/RQBlO4csU+vXKc2cWY7tTpcj5q+37uWpfcCbcnyfcUxywIAFzsQqFfrTIe5dQdleA6mJl0g30iEgXMwU67ZLrMgKavoYfVTNhJr88t4YZBOg3SW1ECMOLdMqiGtW+Z8HSGKGdtuNjnQFKDF4AXGTFy4E6cFdI1ffF4bzJOqD68LujLAOE1bUSicxakqAg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=eviden.com; dmarc=pass action=none header.from=eviden.com; dkim=pass header.d=eviden.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Eviden.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WA4JmnFO6quJgJjuMmHqYZlma04wF7aXCgGdNhPC1xo=; b=PsklfqbPhhDYoSr53oSDIZ7dqqExQNpfxUjQSriLByxSlKb0+qlJUPVCwHdsWbXFVcoaG4UWDFSWD8gcqtFm4eKny6q98X01+aoW1Bf56U8uBzmR60n5oh29reDNKw/4w7vEJGkFxWAtlG5aL77hOeuzsCj32hIBjfd8UPu8gPHJcisDC+zGYniCzTJGcWsVESCf2Mb/F9A2adyv0Jt+3C2tlyRNnHM/vq/bSEk6L8ZI2oG64pI3p5tvMOy076hqXw/pakVlIvnp29S5CbGPIeFCndALFmyxal9hXHes6UQ7LVXkQJ6y/7uZz8sYb4FTugkmFp8l/Fa4gjpnKIAvTg== Received: from AM8PR07MB7602.eurprd07.prod.outlook.com (2603:10a6:20b:24b::7) by AS8PR07MB7080.eurprd07.prod.outlook.com (2603:10a6:20b:239::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.21; Tue, 2 Jul 2024 05:52:29 +0000 Received: from AM8PR07MB7602.eurprd07.prod.outlook.com ([fe80::fbd7:ca71:b636:6f9d]) by AM8PR07MB7602.eurprd07.prod.outlook.com ([fe80::fbd7:ca71:b636:6f9d%4]) with mapi id 15.20.7741.017; Tue, 2 Jul 2024 05:52:29 +0000 From: CLEMENT MATHIEU--DRIF To: "qemu-devel@nongnu.org" CC: "jasowang@redhat.com" , "zhenzhong.duan@intel.com" , "kevin.tian@intel.com" , "yi.l.liu@intel.com" , "joao.m.martins@oracle.com" , "peterx@redhat.com" , "mst@redhat.com" , Clement Mathieu--Drif Subject: [PATCH ats_vtd v5 00/22] ATS support for VT-d Thread-Topic: [PATCH ats_vtd v5 00/22] ATS support for VT-d Thread-Index: AQHazEQGTuJM3iTlWUqCZ55Q529ilg== Date: Tue, 2 Jul 2024 05:52:29 +0000 Message-ID: <20240702055221.1337035-1-clement.mathieu--drif@eviden.com> Accept-Language: en-GB, fr-FR, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=eviden.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: AM8PR07MB7602:EE_|AS8PR07MB7080:EE_ x-ms-office365-filtering-correlation-id: 3cc2560f-7eec-47c1-1c87-08dc9a5b28d4 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; ARA:13230040|1800799024|366016|376014|38070700018; x-microsoft-antispam-message-info: =?utf-8?q?OlhOUZBPMdZ0L7XsgzFUxGwkhZEacBE?= =?utf-8?q?DId/sbvtr+pDYnzvkOfWjvz7gRriyjUJSr/PlrdPI1h/kTBh+2uP9b98fncNWnKoz?= =?utf-8?q?TVCO/q1PlK5TzDhwmqtqNZ4jTacG8ZctGdxkfYfOm408TeJkRjCH9OzaLagLwaHPQ?= =?utf-8?q?CKef2NxPPrT9TUcnXHs2yMoLULuM1Zqu45eTvjJmEyjM8GXrUDPcEY3l0ZYNCI8WR?= =?utf-8?q?A9TjqkUZ2aYuxv4jxrAh8fTa20fV1PzhzORAbYjFxTf/Z8/Me2bZW54knQmTo6bNO?= =?utf-8?q?/KPqjFUeviefgkQvpAl3gx0D1OIqYujDi6CXX8ka0faSlGKxOYd3ISoFUxF+XL9XW?= =?utf-8?q?NkKosuI/Z5fD+O6BuZLPcStD6VFPYMsxmzMEbJyswGXlqEYnUMsowSc5TGFF+iXAq?= =?utf-8?q?R0MmXY3pGcAbRGu1p3P5bfokvf+rGkiiWvcBmL7KDccDZqEe5sqaKhWdX8rqu7gjR?= =?utf-8?q?2fZAkXRuNw3w6iCrSejffZ5o0h5Qhqeuh5WeDiDfag2qf/8vWJc5Q94/jZt2XvByK?= =?utf-8?q?V+/j5iNIwI5mJzjPj1d64O9Pk9P5mmCTaWS3lfCG0LEMAnyWszY+vadXBEzjbJbhw?= =?utf-8?q?vtNpxelJsohvGIcSnSj3OkoWPdleT9RfIz8xPvmO1cAyzPd6DV642kLKeEJTCTtJp?= =?utf-8?q?94mDO4ZG7VD+RN1n0NtD1TXCARdI8Qwv/bIdL6y1zrYnioNgVL4mvjQmR3V9jhQbG?= =?utf-8?q?H+IHqDpTtwn9fB81nXzuf9i3HKbRp8ty1AqSa5PAUvymVoTiu4ek2+X59eNTIe1Yg?= =?utf-8?q?v7qsHgOw4Dv+lHEE5fRVdRhlI5PWLtxFcLlgqIToJgb4cvXIgHeDeWeACySXklfpq?= =?utf-8?q?Ndq0wzS/iM8lfCPnMfsPjQEePnLUyn6F9AoY9Yst3xu0+KRNyKJGWkEi4ccBU9oSl?= =?utf-8?q?X7MbN0QkdKyH8WyCmva03+bgRHWSeY4jRhuHeY/BSSP80jJjm7v4rV76RzLfnrfpR?= =?utf-8?q?WaTtMvE1DRmKYxCe/+Bi3xs0ry0UwMsTzqszhQiwlQ3belKHyKQ+Ev874nRoQokO5?= =?utf-8?q?u1Em2Etsbq5kqW5fXrB0xFQEl0HmispGJMB1YJryvLHgOPBkCj2KFPmr9iplpeGyH?= =?utf-8?q?gRBDQ4PQopaGqW8SHHjuVBiH4JwmaZbQo4Ah641Wc24kRKpRB9RFeJ4F4LPf70Rm8?= =?utf-8?q?ofxv3wvuAt3JIa0rLZUe06/qtWKoBBX4md0lEYUhoerSFWsBUXu+m+zoW9Y03HT1z?= =?utf-8?q?gRFLkmre8TiZJWKAvVsn3qiXgKMN4UfKpJ3neiuGeaGALj2gZOntyn/gd4u6fRRGy?= =?utf-8?q?IsGX/n/e3wX+9nZ7olVbkJUZrtZm9jOIfkK3pHEBdBSQhfx11GNzJ/4w=3D?= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM8PR07MB7602.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(1800799024)(366016)(376014)(38070700018); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?q?iidUUPFbP9wb6I6AJRxl7bBkjWPm?= =?utf-8?q?RSD3nEQvq4729izgiwaz0Qh1KtzjI11GYOuurqByFvmlwiOgWpWr99VntWTqp3Qn+?= =?utf-8?q?yUUid02bGzHqodFXh6AgRkyfKsnfihbXFV3kk142R9mNWLt3BJtVbLGv0fOoZBoCp?= =?utf-8?q?PBsKopm9sMDAMnRgd88mwkYmL04SaTq8XfHAr13JM8u9Vw8Q5ht7fNqgqjjEhHWmd?= =?utf-8?q?ISOdT/Djd+TpYZwDR1Pp/zzBiIjFar3x7UcpN7ROFmy9qt5oG+auBPIt71rO1hGDu?= =?utf-8?q?fnqrRaZ+ZT9ZfQcTA5TyNqfN75kTu1DF9u77XEYIWOh6dCL9x6qRpbEwqo8KzmI1R?= =?utf-8?q?/8SkpSiDMCPoHBjsj+U5BYNZYFKm8Mu6OHY9BnfoLCxOEcX6R94WkM2jGgZd6pU6i?= =?utf-8?q?lV8zJM09gavAGJFwYroyTbSJKyc+tF67vEY2fOzetJXPmlnuCKe5wXeTzem8tVArr?= =?utf-8?q?WRLzuqHZGc+/zrvLvuOqCQjt4F5trDv9hJmNd+86b9CXuOCRWrvcp75pVZ1tIxa28?= =?utf-8?q?aVp1Vc33igsaOPFjDLEhEYglRdKoyfL7osBj6QfPQrHyBDWAW/YrdLh6+tgMLp5o5?= =?utf-8?q?szIHwe1BhWy+8tIPZyu4s8zWDk03r24VNhKR56+F4vpJ6L1Y9l1wpgWmW84MPWmpo?= =?utf-8?q?TordigaF9N6Smd+xD8MCe64lPxTMRg0NrFr/LWZRHASPBvp+vmUkYMNYydrdO2U6y?= =?utf-8?q?LQmdIB4k44mK+L8inXWLHkK3FI4W4Z9So+5JQK0SbF/v+4GorYv29kO8LNZKNiLaP?= =?utf-8?q?4DKVbZWu+7Yha5TlWIpXZi0wdl39lnuPLEH9/DsCiJpH70b+UHZQd3ymqGFrEw7i+?= =?utf-8?q?vkgLGarmVflSY/UOE46S6LwnX6HpG9y9Am9apVWBc/3mU5Q5Y0ayrBBb+hwgmhRML?= =?utf-8?q?1e/v80m2AlV1WQjH9JgmtKiN4GQrvmsfTdJNESZ7MjRxUavcHPiL0Bj9/0AOlmn5D?= =?utf-8?q?WCx5zYIUcA3y5mzv0yVSlYBcRdX2bITU912oG0p6+YtLjBS7NrwJT9ndoKKEW+EjT?= =?utf-8?q?Kj1XDf/21ZcdXCii2ehEjn8wlTYd/+/+VBv+Z06w29IG4d/EwlWAW27G0qocIh3pO?= =?utf-8?q?rnxIOGQKmuKV4OMoBtLTTDRPObNBdESgszXVtaSYQXFctAZAZK19GjeGZf7RXOPa+?= =?utf-8?q?vqNyELBXiF155q0Y/1CFj1O89OhMy4sBgq4rHlvHop/bTGkU+pIodP83E8Z32pAv9?= =?utf-8?q?vhYj1W4FzpLG6diOBJEbGQmmm4BZIi2MtaqmbBcE0x6ai35QR6ZYVFYofejS/rjDI?= =?utf-8?q?olCOnqdDbIKmy7E1hr3/uUD34+n2IlYpkCZE4ujsWnahrg989pLGiQEihh5jW89Wd?= =?utf-8?q?2kUvRhNl4o16zdGrARr8/a5Vx6BySAlirXUDKwEXWlIVMPubX/dHnseyfl5lYOKlv?= =?utf-8?q?5q5yS9TgOKe7PylnWXg8eDY1m5FfuXZTEqyCsmtUYQCZKwYtB4FglYOoZXv40pY6w?= =?utf-8?q?GDpypOPaqV+j6QffcbDjiVM2L3SweY80geOrbHzSLMGtQtU4XZxOAfeuYLUrRlDxo?= =?utf-8?q?DP5M17szIghAiiwlar2jQmvFVWcZz1Jr+GDWxLDSMPsk7dlaKBkf8Qs=3D?= Content-ID: <99A8722FDD8E6B45B2092387C17A64A4@eurprd07.prod.outlook.com> MIME-Version: 1.0 X-OriginatorOrg: eviden.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: AM8PR07MB7602.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3cc2560f-7eec-47c1-1c87-08dc9a5b28d4 X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jul 2024 05:52:29.7070 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 7d1c7785-2d8a-437d-b842-1ed5d8fbe00a X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: iiOPYtbtI99hLZ1tEGoCXH9s3nx2wKvz7Wp/t3cC9c7BHaSWFKylLA8V8v/HrtIryUvoQ/7dsy9FfdPq41bfdlcBGnjVLJgpCrWuNwcY5I7Wtp8SykimgBxGEGqZ1tjH X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR07MB7080 Received-SPF: pass client-ip=80.78.11.82; envelope-from=clement.mathieu--drif@eviden.com; helo=smarthost1.eviden.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org From: Clement Mathieu--Drif This series belongs to a list of series that add SVM support for VT-d. As a starting point, we use the series called 'intel_iommu: Enable stage-1 translation' (rfc2) by Zhenzhong Duan and Yi Liu. Here we focus on the implementation of ATS support in the IOMMU and on a PCI-level API for ATS to be used by virtual devices. This work is based on the VT-d specification version 4.1 (March 2023). Here is a link to a GitHub repository where you can find the following elements : - Qemu with all the patches for SVM - ATS - PRI - Device IOTLB invalidations - Requests with already translated addresses - A demo device - A simple driver for the demo device - A userspace program (for testing and demonstration purposes) https://github.com/BullSequana/Qemu-in-guest-SVM-demo v2 - handle huge pages better by detecting the page table level at which the translation errors occur - Changes after review by ZhenZhong Duan : - Set the access bit after checking permissions - helper for PASID and ATS : make the commit message more accurate ('present' replaced with 'enabled') - pcie_pasid_init: add PCI_PASID_CAP_WIDTH_SHIFT and use it instead of PCI_EXT_CAP_PASID_SIZEOF for shifting the pasid width when preparing the capability register - pci: do not check pci_bus_bypass_iommu after calling pci_device_get_iommu_bus_devfn - do not alter formatting of IOMMUTLBEntry declaration - vtd_iova_fl_check_canonical : directly use s->aw_bits instead of aw for the sake of clarity v3 - rebase on new version of Zhenzhong's flts implementation - fix the atc lookup operation (check the mask before returning an entry) - add a unit test for the ATC - store a user pointer in the iommu notifiers to simplify the implementation of svm devices Changes after review by Zhenzhong : - store the input pasid instead of rid2pasid when returning an entry after a translation - split the ATC implementation and its unit tests v4 Changes after internal review - Fix the nowrite optimization, an ATS translation without the nowrite flag should not fail when the write permission is not set v5 Changes after review by Philippe : - change the type of 'level' to unsigned in vtd_lookup_iotlb Clément Mathieu--Drif (22): intel_iommu: fix FRCD construction macro. intel_iommu: make types match intel_iommu: return page walk level even when the translation fails intel_iommu: do not consider wait_desc as an invalid descriptor memory: add permissions in IOMMUAccessFlags pcie: add helper to declare PASID capability for a pcie device pcie: helper functions to check if PASID and ATS are enabled intel_iommu: declare supported PASID size pci: cache the bus mastering status in the device pci: add IOMMU operations to get address spaces and memory regions with PASID memory: store user data pointer in the IOMMU notifiers pci: add a pci-level initialization function for iommu notifiers intel_iommu: implement the get_address_space_pasid iommu operation intel_iommu: implement the get_memory_region_pasid iommu operation memory: Allow to store the PASID in IOMMUTLBEntry intel_iommu: fill the PASID field when creating an instance of IOMMUTLBEntry atc: generic ATC that can be used by PCIe devices that support SVM atc: add unit tests memory: add an API for ATS support pci: add a pci-level API for ATS intel_iommu: set the address mask even when a translation fails intel_iommu: add support for ATS hw/i386/intel_iommu.c | 146 +++++- hw/i386/intel_iommu_internal.h | 6 +- hw/pci/pci.c | 127 +++++- hw/pci/pcie.c | 42 ++ include/exec/memory.h | 51 ++- include/hw/i386/intel_iommu.h | 2 +- include/hw/pci/pci.h | 101 +++++ include/hw/pci/pci_device.h | 1 + include/hw/pci/pcie.h | 9 +- include/hw/pci/pcie_regs.h | 3 + include/standard-headers/linux/pci_regs.h | 1 + system/memory.c | 20 + tests/unit/meson.build | 1 + tests/unit/test-atc.c | 527 ++++++++++++++++++++++ util/atc.c | 211 +++++++++ util/atc.h | 117 +++++ util/meson.build | 1 + 17 files changed, 1332 insertions(+), 34 deletions(-) create mode 100644 tests/unit/test-atc.c create mode 100644 util/atc.c create mode 100644 util/atc.h